Megaleecher.Net

Making technology work for you...

Get Your Free Subscription By Email:

Asus Leaves Router Users Wide Open For Anybody To Access Their Disks

We have already seen how vulnerable routers can be a security threat, but ASUSTeK Computer Inc (ASUS) made everything feel small by leaving two critical flaws allowing anybody in the world to simply open a web-browser and access any Asus routers data with full read-write permission by simply typing a URL. This is not all, when notified about the severe design flaw, the company did nothing and ignored emails and phonecalls by researcher Kyle Lovetts who discovered the flaw.

To make their point and expose the vulnerability, a group did some guerrilla styled attack hacking into 13,000+ IP addresses using vulnerable Asus routers and left a text-file explaining the hack into user's router attached media disks. The text file informed users : "This is an automated message being sent out to everyone effected [sic]," the message, uploaded to his device without any login credentials, read. "Your Asus router (and your documents) can be accessed by anyone in the world with an Internet connection. You need to protect yourself and learn more by reading the following news article: http//nullfluid.com/asusgate.txt."

Visiting the mentioned url (as shown below), shows details about the exploit and how Asus has left users with an wide-open ftp server allowing anonymous login with full read-write privilege and AiCloud usernames and passwords stored in a plaintext file which is available for download without logging in. The group also made public a torrent link containing 10,000+ list of files stored on the Asus-connected hard drives for anybody to access.

Asusgate

Fixing The Horrible Windows "Unable To Access" Network Resource Error

Microsoft Windows has came a long way since the dreadful days of common OS crashes and BSOD's, I have been using my current install of Microsoft Windows 7 since past 2.5 years and never faced any major annoyance. Suddenly, few days ago my computer failed to connect to any shared network folder and greeted me with the error "Windows cannot access \\machine\sharedfolder, error code 0x80004005" every-time I tried accessing a network resource as shown below. Strangely, the computer was discovering other computers on the network and I was able to ping and SSH into them like my Raspberry Pi Network Attached Storage (NAS). After, trying everything from messing with firewall settings, completely uninstalling Kaspersky Internet Security 2014, enabling all sorts of networking services and changing security policies nothing worked. After 5 days of reading numerous articles on the internet I finally managed to nail this and solve this problem as shared below.

Unable to Browse the Network

Fixing dllhost.exe Constant CPU Usage And Memory Leak

A long ago we shared a solution for "Windows 7 Lock-up While Using Windows Photo Viewer" which involved dllhost.exe's incompatibility with Kaspersky Antivirus. I recently faced a similar issue where Microsoft's genuine dllhost.exe file was constantly using 25% of CPU with ever increasing RAM (a memory leak) consumption, this time it was not the Kaspersky incompatibility causing the issue but a Windows 7 bug how it handles thumbnail generation. The reason for the issue was a broken video download on my Desktop, Windows was trying to generate thumbnail for that broken/incompatible video file and failing causing the constant CPU usage - the solution was to simply delete the problematic file or move it to a inner folder in which case the problem will occur only when accessing that particular folder.

dllhost.exe causing high cpu and RAM usage

BSNL Security Loophole Allows Anybody To See Your Account Balance Amount And Expiry Date

Bharat Sanchar Nigam Limited (BSNL), the Indian state-owned telecommunications company is neither known for it's quality of service nor for customer satisfaction. To make their services more user-friendly they started allowing quick online recharge facility from their website, but this service has a data privacy loophole where anybody can check any BSNL subscribers prepaid balance with expiry date. While this may not sound a big security risk the data exposed can be used to device social-engineering phishing attacks, for example - a malicious hacker can fetch this data and utilize it for calling the subscriber as an BSNL employee supplying this information to gain trust of the consumer and asking them to order a highly subsidized online recharge from a fake website.

BSNL Security Loophole

Wondershare Photo Recovery : Media Recovery Utility For Windows And Mac

Photos are one the most important memories of your life which nobody would like to loose, luckily there are chances of data recovery even after an accidental deletion and professional utilities like "Wondershare Photo Recovery" comes to a user's rescue in such bad situations.

Wondershare Photo Recovery is an commercial utility for Windows and Mac users allowing recovery of media files from digital camera, memory card, USB drive, hard drive and other storage devices with a few clicks. The simple to use point-n-click utility allows recovery of deleted or formatted image, video and audio files from many storage devices.

Wondershare Photo Recovery

FBI Can Activate Your Computer Camera Without Triggering The Light Which Tells When It's Recording

We all are now very well aware of the fact that almost all big government's use cyber-warfare to spy on each other and individuals of interest, NSA, USA's cyber-weapon Flame, suspected Chinese spying using Electric Kettles and other communication devices are prime public examples of this.

The latest revelations made by "The Washington Post's" story "FBI’s search for ‘Mo,’ suspect in bomb threats, highlights use of malware for surveillance" provides further glimpses onto how intrusive these tactics can get. The FBI's ability to covertly activate a users computer camera without triggering the notification light which informs the user that it is being recorded is one such example, While used for good purpose of catching criminals and controlling terrorism now what happens when the technology gets leaked or gets abused by whom which have access to it now to settle personal scores or invade one's privacy?

FBI Camera Spying

Hacker Claims To Have PlayStation 4 Cracked Unlocking The Path For Pirated Games

Sony PS4 Hacked

We all know Sony takes business very seriously, and unlike other tech companies takes a very strong stand against anybody trying to circumvent their console security for enabling sideloading or game piracy. Sony sued the well-known Apple iOS hacker George Hotz for releasing the first-ever Playstation3 custom firmware which was the initial step towards letting others enable game piracy for the earlier locked platform. An alleged Sony PS4 jailbreak named Reckz0r has now made it's presence public online claiming to allow execution of unassigned/unauthorized code and pirated games on PS4 exploiting an vulnerability in underlying FreeBSD based Orbis OS. The author goes ahead with sharing all details and files showing users how to "crack" their PS4's labeling this as an tribute to George Hot.

Reckz0r

How To Make A Google Account Without Gmail

If you already have an email address and do not want to get a new Gmail account, Google does provide an alternative signup web-form to get your free Google account utilizing your existing email id. One simply needs to use https://accounts.google.com/SignUpWithoutGmail and complete the signup process skipping the need of an Gmail account. The same can also be accessed using the "I prefer to use my current email address" option located just below the text-filed where it asks for Gmail ID in default Google signup form.

Steps To Create Google Account With Non Gmail Address

Spinning Globe With Just 1K Of Self-replicating Javascript Code

The mind-blowing javascript globe animation shared below is not just awesome because of it's compact code size of just 1K, but also because it is a Quine, which is by definition "A computer program which takes no input and produces a copy of its own source code as its only output. The standard terms for these programs in the computability theory and computer science literature are self-replicating programs, self-reproducing programs, and self-copying programs." Which means, the code you are seeing below is the exact code which is used to generate it.

Assassination Market : Online Crowdfunded Killings With Bitcoins

Bitcoin, the digital cryptocurrency being anonymous and untraceable has been the preferred choice for doing illegal business online. After, being widely used for all kinds on illegal online trading like drugs, exploits and numerous other black-market services the currency has another taker which will definitely raise many eyebrows and can result in strict governmental actions. A new online service hosted on underground, anonymous Tor network is now being used to offer an crowdfunded bounty killer service. Named "The Assassination Market" the service lets anyone anonymously contribute bitcoins towards a bounty on the head of any government official just like Kickstarter but for political assassinations.

The Kickstarter for political murders is already receiving huge funds and have 7 nominations (nominating someone needs someone to propose a name and pay the 1 Bitcoin fee worth US$766.99) so far. "Ben Shalom Bernanke" the current chairman of Federal Reserve USA tops the chart and has collected maximum bounty worth ฿124.14 or US$95106.76 at today's exchange rate.

The Assassination Market
This is just one of the many helpful tips we have posted, You can find more stories here,
Do subscribe to updates using your favorite RSS feed reader or using the secure FeedBurner email update form on top of this post.